Zedmos
All features
Inspection

TLS Inspection + Fingerprinting

Server Name, application-layer protocol, and TLS client fingerprint extracted inline — with optional forward-proxy decryption under a short-lived internal certificate authority.

GA65K fingerprints
HOW IT WORKS

Walk through a single flow

  1. 1The Client Hello is parsed on the fast path without allocating a TLS library context.
  2. 2Fingerprints — JA3, JA3S, JA4 — are derived from cipher suite order, extensions, and elliptic curves.
  3. 3Policies match on Server Name, ALPN, minimum TLS version, or raw fingerprint hash.
  4. 4Forward-proxy posture introduces a short-lived certificate authority for inbound inspection when required.
UNDER THE HOOD

Technical notes

Fingerprint storage

A purpose-built hash table holds tens of thousands of fingerprint entries with open addressing. Lists swap atomically when threat intelligence updates — no packets dropped, no restart.

Wildcard domain matching

Domain patterns share memory in a suffix trie with prefix compression. Match cost stays logarithmic even with many granular overrides.